summaryrefslogtreecommitdiff
path: root/src/tests
AgeCommit message (Collapse)AuthorFilesLines
2013-01-15Add domain argument to sysdb_delete_group()Simo Sorce1-5/+8
Also remove sysdb_delete_domgroup()
2013-01-15Add domain argument to sysdb_delete_user()Simo Sorce1-5/+8
Also remove sysdb_delete_domuser()
2013-01-15Add domain to sysdb_delete_customSimo Sorce1-1/+1
2013-01-15Add domain argument to sysdb_search_custom()Simo Sorce1-1/+3
Also changes sysdb_search_custom_by_name()
2013-01-15Add domain argument to sysdb_store_custom()Simo Sorce1-1/+1
2013-01-15Add domain argument to sysdb_cache_auth()Simo Sorce1-4/+8
2013-01-15Add domain argument to sysdb_cache_password()Simo Sorce1-1/+1
2013-01-15Add domain arg to sysdb group member functionsSimo Sorce1-6/+10
2013-01-15Add domain argument to sysdb_store_group()Simo Sorce1-9/+12
Also remove sysdb_store_domgroup()
2013-01-15Add domain argument to sysdb_store_user()Simo Sorce1-9/+14
Also remove sysdb_store_domuser()
2013-01-15Add domain arguments to sysdb_add_inetgroup fns.Simo Sorce1-2/+2
2013-01-15Add domain arguments to sysdb_add_group functions.Simo Sorce1-7/+9
2013-01-15Add domain argument to sysdb_add_user()Simo Sorce1-2/+2
2013-01-15Add domain argument to sysdb_add_basic_user()Simo Sorce1-0/+1
2013-01-15Add domain argument to sysdb_set_netgroup_attr()Simo Sorce1-1/+1
2013-01-15Add domain argument to sysdb_set_group_attr()Simo Sorce1-12/+12
2013-01-15Add domain argument to sysdb_set_user_attr()Simo Sorce1-3/+4
2013-01-15Add domain arg to sysdb_search_netgroup_by_name()Simo Sorce1-0/+1
2013-01-15Add domain to sysdb_search_group_by_gid()Simo Sorce1-1/+24
Also remove unused sysdb_search_domgroup_by_gid()
2013-01-15Add domain to sysdb_search_group_by_name()Simo Sorce1-3/+4
Also remove unused sysdb_search_domgroup_by_name()
2013-01-15Add domain to sysdb_search_user_by_uid()Simo Sorce1-1/+2
Also remove unused sysdb_search_domuser_by_uid()
2013-01-15Add domain to sysdb_search_user_by_name()Simo Sorce1-3/+4
Also remove unused sysdb_search_domuser_by_name()
2013-01-15Add domain argument to sysdb_get_user_attr()Simo Sorce1-2/+2
2013-01-15Add domain option to sysdb_get/netgr/attrs() fnsSimo Sorce1-3/+3
2013-01-15Pass domain to sysdb_enum<pw/gr>ebt() functionsSimo Sorce1-0/+2
2013-01-15Pass domain to sysdb_get<pwu/grg><id() functionsSimo Sorce1-0/+2
2013-01-15Pass domain to sysdb_get<pw/gr>nam() functionsSimo Sorce1-8/+20
Also allows us to remove sysdb_subdom_get<pw/gr>nam() wrappers and restore fqnames proper value in subdomains, by testing for a parent domain being present or not.
2013-01-15Make sysdb_domain_dn() require a domain.Simo Sorce1-1/+1
2013-01-15Make sysdb_netgroup_dn() require a domain explictly.Simo Sorce1-2/+4
2013-01-15Make sysdb_group_dn() require a domain explictly.Simo Sorce1-2/+4
2013-01-15Make sysdb_user_dn() require a domain explictly.Simo Sorce1-2/+4
2013-01-15Refactor single domain initializationSimo Sorce3-9/+9
Bring it out of sysdb, which will slowly remove internal dependencies on domains and instead will always require them to be passed by callers.
2013-01-10Change pam data auth tokens.Simo Sorce1-5/+8
Use the new authtok abstraction and interfaces throught the code.
2013-01-10Code can only check for cached passwordsSimo Sorce1-4/+2
Make it clear to the API users that we can not take arbitrary auth tokens. We can only take a password for now so simplify and clarify the interface.
2013-01-08Remove dead netgroup functionsSimo Sorce1-264/+0
2013-01-08Refactor gid handling in the PAC responderSumit Bose1-21/+36
Instead of using a single array of gid-domain_pointer pairs, Simo suggested to use a gid array for each domain an store it with a pointer to the domain.
2013-01-08Add tests for get_gids_from_pac()Sumit Bose1-0/+256
2013-01-08Add find_domain_by_id()Sumit Bose1-0/+49
Currently domains can only be searched by name in the global domain list. To make it easier to find the domain for a given SID find_domain_by_id() which returns a pointer to the domain or subdomain entry in the global domain list if a matching id was found.
2013-01-08Use struct pac_grp instead of gid_t for groups from PACSumit Bose1-8/+11
To be able to handle groupmemberships from other domains more data than just the gid must be kept for groups given in the PAC.
2013-01-06Remove unused headerSimo Sorce1-1/+0
2013-01-02failover: Protect against empty host namesMichal Zidek1-0/+91
Added new parameter to split_on_separator that allows to skip empty values. The whole function was rewritten. Unit test case was added to check the new implementation. https://fedorahosted.org/sssd/ticket/1484
2012-12-05MEMBEROF: Keep inherited ghost users around on modify operationJakub Hrozek1-0/+248
https://fedorahosted.org/sssd/ticket/1652 It is possible to simply reset the list of ghost users to a different one during a modify operation. It is also actually how we update entries that are expired in the SSSD cache. In this case, we must be careful and retain the ghost users that are not native to the group we are processing but are rather inherited from child groups. The intention of the replace operation after all is to set the list of direct members of that group, not direct and indirect.
2012-12-05MEMBEROF: Implement the modify operation for ghost usersJakub Hrozek1-0/+480
Similar to the add and delete operation, we also need to propagate the changes of the ghost user attribute to the parent groups so that if a nested group updates memberships, its parents also get the membership updated.
2012-12-05MEMBEROF: Implement delete operation for ghost usersJakub Hrozek1-1/+106
https://fedorahosted.org/sssd/ticket/1668 The memberof plugin did only expand the ghost users attribute to parents when adding a nested group, but didn't implement the reverse operation. This bug resulted in users being reported as group members even after the direct parent went away as the expanded ghost attributes were never removed from the parent entry. When a ghost entry is removed from a group, all its parent groups are expired from the cache by setting the expire timestamp to 1. Doing so would force the SSSD to re-read the group next time it is requested in order to make sure its members are really up-to-date.
2012-11-26TESTS: Test ghosts users in the RFC2307 schemaJakub Hrozek1-0/+248
2012-11-26MEMBEROF: Do not add the ghost attribute to selfJakub Hrozek1-2/+86
When a nested group with ghost users is added, its ghost attribute should propagate within the nested group structure much like the memberuid attribute. Unlike the memberuid attribute, the ghost attribute is only semi-managed by the memberof plugin and added manually to the original entry. This bug caused LDB errors saying that attribute or value already exists when a group with a ghost user was added to the hierarchy as groups were updated with an attribute they already had.
2012-11-20LDAP: Only convert direct parents' ghost attribute to memberJakub Hrozek1-6/+7
https://fedorahosted.org/sssd/ticket/1612 This patch changes the handling of ghost attributes when saving the actual user entry. Instead of always linking all groups that contained the ghost attribute with the new user entry, the original member attributes are now saved in the group object and the user entry is only linked with its direct parents. As the member attribute is compared against the originalDN of the user, if either the originalDN or the originalMember attributes are missing, the user object is linked with all the groups as a fallback. The original member attributes are only saved if the LDAP schema supports nesting.
2012-11-19Fix compare_principal_realm() checkSumit Bose1-0/+6
In case of a short UPN compare_principal_realm() erroneously returns an error.
2012-11-14Add string_in_list() and add_string_to_list() with testsSumit Bose1-0/+83
string_in_list() and add_string_to_list() are two utilities for NULL terminated strings arrays. add_string_to_list() adds a new string to an existing list or creates a new one with the strings as only item if there is not list. string_in_list() checks if a given string is in the list. It can be used case sensitive or in-sensitive.
2012-11-13TESTS: Fix a couple of debug-level settersJakub Hrozek3-3/+3